{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T09:15:13Z","timestamp":1767518113338,"version":"3.48.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T00:00:00Z","timestamp":1767484800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T00:00:00Z","timestamp":1767484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No.62102449"],"award-info":[{"award-number":["Grant No.62102449"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Plains Talent Program","award":["grant No.224200510003"],"award-info":[{"award-number":["grant No.224200510003"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The advancement of quantum attacks has posed a significant threat to blockchain cryptosystems. Furthermore, the finite lifecycles of ciphertext and keys may result in data leakage risks for long-term storage due to potential breaches in ciphertext security, necessitating ciphertext updates. Ensuring the long-term security of cryptographic algorithms on blockchains against quantum attacks has emerged as a critical concern in blockchain research. A blockchain oracle serves as a mechanism for data communication. The Module-Learning with Errors (MLWE) problem is a significant issue in lattice-based cryptography, providing security against quantum attacks. To resist the threat of quantum attacks on encrypted data and ensure the long-term security, this study proposed an updatable encryption (UE) scheme for blockchain oracles based on post-quantum cryptography. First, this study developed a UE scheme based on the blockchain oracle architecture, enabling the oracle to update encrypted data via update tokens, ensuring the data's long-term security. Additionally, a UE algorithm based on the MLWE problem was introduced to enhance its resistance to quantum attacks. Finally, an error-correcting mechanism tailored for the UE algorithm was developed to validate transmitted data, correct errors, and improve the scheme's robustness. The experimental results demonstrate that the proposed scheme not only provides quantum-resistant security but also enables ciphertext updates through update tokens. Compared to existing schemes, it has more advantages in protecting data security.<\/jats:p>","DOI":"10.1186\/s42400-025-00442-w","type":"journal-article","created":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T09:12:21Z","timestamp":1767517941000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An updatable encryption scheme for blockchain oracle based on post-quantum cryptography"],"prefix":"10.1186","volume":"9","author":[{"given":"Shihao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xuehui","family":"Du","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Aodi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenjuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,4]]},"reference":[{"key":"442_CR1","doi-asserted-by":"crossref","unstructured":"ALEKHNOVICH M (2003) More on average case vs approximation complexity. In: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, IEEE, pp 298\u2013307.","DOI":"10.1109\/SFCS.2003.1238204"},{"key":"442_CR2","doi-asserted-by":"crossref","unstructured":"Almuqren L, Mahmood K, Aljameel S S, et al (2023) Blockchain-Assisted Secure Smart Home Network using Gradient Based Optimizer with Hybrid Deep Learning Model[J]. IEEE Access.","DOI":"10.1109\/ACCESS.2023.3303087"},{"issue":"2","key":"442_CR3","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/JSAC.2020.3020655","volume":"39","author":"GS Aujla","year":"2020","unstructured":"Aujla GS, Jindal A (2020) A decoupled blockchain approach for edge-envisioned IoT-based healthcare monitoring. IEEE J Sel Areas Commun 39(2):491\u2013499","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"442_CR4","first-page":"1","volume":"2","author":"R Avanzi","year":"2019","unstructured":"Avanzi R, Bos J, Ducas L et al (2019) CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC round 2(4):1\u201343","journal-title":"NIST PQC round"},{"key":"442_CR5","unstructured":"Barker, E (2007) Recommendation on Key Management SP800\u201357-Part-1-revised2 08 Mar 2007. NIST. https:\/\/csrc.nist.gov\/publications\/nistpubs\/800-57\/ sp800\u201357-Part1-revised2_Mar08\u20132007.pdf."},{"key":"442_CR6","doi-asserted-by":"crossref","unstructured":"Bernstein D J, H\u00fclsing A, K\u00f6lbl S, et al (2019) The SPHINCS+ signature framework. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, pp 2129\u20132146.","DOI":"10.1145\/3319535.3363229"},{"key":"442_CR7","doi-asserted-by":"crossref","unstructured":"Bissias G, Ozisik A P, Levine B N, et al (2014) Sybil-resistant mixing for bitcoin. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp 149\u2013158.","DOI":"10.1145\/2665943.2665955"},{"key":"442_CR8","first-page":"410","volume-title":"Annual Cryptology Conference, Berlin","author":"D Boneh","year":"2013","unstructured":"Boneh D, Lewi K, Montgomery H et al (2013) Key homomorphic PRFs and their applications. Annual Cryptology Conference, Berlin. Springer, Berlin Heidelberg, Heidelberg, pp 410\u2013428"},{"key":"442_CR9","first-page":"464","volume-title":"Annual International Cryptology Conference","author":"C Boyd","year":"2022","unstructured":"Boyd C, Davies GT, Gj\u00f8steen K et al (2022) Fast and secure updatable encryption. Annual International Cryptology Conference. Springer International Publishing, Cham, pp 464\u2013493"},{"key":"442_CR10","first-page":"505","volume-title":"Annual cryptology conference, Berlin","author":"Z Brakerski","year":"2011","unstructured":"Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-LWE and security for key dependent messages. Annual cryptology conference, Berlin. Springer, Berlin Heidelberg, Heidelberg, pp 505\u2013524"},{"key":"442_CR11","first-page":"1","volume":"1","author":"L Breidenbach","year":"2021","unstructured":"Breidenbach L, Cachin C, Chan B et al (2021) Chainlink 2.0: Next steps in the evolution of decentralized oracle networks. Chainlink Labs 1:1\u2013136","journal-title":"Chainlink Labs"},{"key":"442_CR24","unstructured":"Dos Network (2021) Dos network: A decentralized oracle service boosting blockchain usability with off-chain data & verifiable computing power. https:\/\/s3.ama-zonaws.com\/whitepaper.dos\/DOS+Network+Technical+ Whitepaper.pdf."},{"key":"442_CR12","doi-asserted-by":"crossref","unstructured":"Egberts A (2017) The oracle problem-an analysis of how blockchain oracles undermine the advantages of decentralized ledger systems. Available at SSRN 3382343.","DOI":"10.2139\/ssrn.3382343"},{"issue":"10","key":"442_CR13","doi-asserted-by":"publisher","first-page":"6830","DOI":"10.1109\/TIT.2013.2272036","volume":"59","author":"JC Faugere","year":"2013","unstructured":"Faugere JC, Gauthier-Umana V, Otmani A et al (2013) A distinguisher for high-rate McEliece cryptosystems. IEEE Trans Inf Theory 59(10):6830\u20136844","journal-title":"IEEE Trans Inf Theory"},{"key":"442_CR14","doi-asserted-by":"crossref","unstructured":"Gazi O, Gazi O (2020) BCH codes. Forward Error Correction via Channel Coding: 177\u2013217.","DOI":"10.1007\/978-3-030-33380-5_6"},{"key":"442_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/9781003239895","volume-title":"Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT)","author":"S Gupta","year":"2022","unstructured":"Gupta S, Sharma HK, Kapoor M (2022) Blockchain for Secure Healthcare Using Internet of Medical Things (IoMT). Springer"},{"key":"442_CR16","doi-asserted-by":"crossref","unstructured":"Jiang Y (2020) The direction of updatable encryption does not matter much. In: Advances in Cryptology\u2013ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7\u201311, 2020, Proceedings, Part III 26. Springer International Publishing, pp 529\u2013558.","DOI":"10.1007\/978-3-030-64840-4_18"},{"key":"442_CR17","doi-asserted-by":"crossref","unstructured":"Kloo\u00df M, Lehmann A, Rupp A (2019) CCA secure updatable encryption with integrity protection. In: Advances in Cryptology\u2013EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19\u201323, 2019, Proceedings, Part I 38. Springer International Publishing, pp 68\u201399.","DOI":"10.1007\/978-3-030-17653-2_3"},{"issue":"3","key":"442_CR18","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","volume":"75","author":"A Langlois","year":"2015","unstructured":"Langlois A, Stehl\u00e9 D (2015) Worst-case to average-case reductions for module lattices. Des Codes Crypt 75(3):565\u2013599","journal-title":"Des Codes Crypt"},{"key":"442_CR19","doi-asserted-by":"crossref","unstructured":"Lehmann A, Tackmann B (2018) Updatable encryption with post-compromise security. In: Advances in Cryptology\u2013EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29-May 3, 2018 Proceedings, Part III 37, Springer International Publishing, pp 685\u2013716.","DOI":"10.1007\/978-3-319-78372-7_22"},{"key":"442_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s12528-019-09209-y","author":"D Lizcano","year":"2019","unstructured":"Lizcano D, Lara JA, White B et al (2019) Blockchain-based approach to create a model of trust in open and ubiquitous higher education. J Comput High Educ. https:\/\/doi.org\/10.1007\/s12528-019-09209-y","journal-title":"J Comput High Educ"},{"key":"442_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.103816","volume":"129","author":"W Lu","year":"2021","unstructured":"Lu W, Li X, Xue F et al (2021) Exploring smart construction objects as blockchain oracles in construction supply chain management. Autom Constr 129:103816","journal-title":"Autom Constr"},{"key":"442_CR22","unstructured":"Lu X, Liu Y, Zhang Z, et al (2018) LAC: Practical ring-LWE based public-key encryption with byte-level modulus. Cryptology ePrint Archive."},{"key":"442_CR23","unstructured":"Menon S, Jain K (2021) Blockchain technology for transparency in agri-food supply chain: Use cases, limitations, and future directions. IEEE Transactions on Engineering Management."},{"key":"442_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2023.107776","volume":"208","author":"X Peng","year":"2023","unstructured":"Peng X, Zhao Z, Wang X et al (2023) A review on blockchain smart contracts in the agri-food industry: Current state, application challenges and future trends. Comput Electron Agric 208:107776","journal-title":"Comput Electron Agric"},{"key":"442_CR26","unstructured":"Peterson J, Krug J (2015) Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv:1501.01042."},{"key":"442_CR27","unstructured":"Provable (2020) Provable. https:\/\/provable.xyz\/papers\/random datasource-rev1.pdf."},{"issue":"6","key":"442_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM) 56(6):1\u201340","journal-title":"Journal of the ACM (JACM)"},{"key":"442_CR29","doi-asserted-by":"crossref","unstructured":"Song M, Niu S, Fang L (2021) A ciphertext updatable attribute-based searchable encryption scheme via blockchain. In: 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT), IEEE, 2021: 18\u201324.","DOI":"10.1109\/CECIT53797.2021.00012"},{"key":"442_CR30","doi-asserted-by":"crossref","unstructured":"Song Y, Gao H, Sun K, et al (2023) Token Open Secure and Post-quantum Updatable Encryption Based on MLWE. In: International Conference on Security, Privacy, and Applied Cryptography Engineering. Cham: Springer Nature Switzerland, pp 20\u201347.","DOI":"10.1007\/978-3-031-51583-5_2"},{"key":"442_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119160","volume":"214","author":"M Taghavi","year":"2023","unstructured":"Taghavi M, Bentahar J, Otrok H et al (2023) A reinforcement learning model for the reliability of blockchain oracles. Expert Syst Appl 214:119160","journal-title":"Expert Syst Appl"},{"key":"442_CR32","unstructured":"Zhang L, Wu W, Wang Y, et al (2014) LAC: A lightweight authenticated encryption cipher. Submitted to the CAESAR competition."},{"key":"442_CR33","doi-asserted-by":"crossref","unstructured":"Zhang F, Cecchetti E, Croman K, et al (2016) Town crier: An authenticated data feed for smart contracts. In: Proceedings of the 2016 aCM sIGSAC conference on computer and communications security, pp 270\u2013282.","DOI":"10.1145\/2976749.2978326"},{"key":"442_CR34","doi-asserted-by":"crossref","unstructured":"Zhou Y, Zhu X, Chen A, et al (2024) Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption. Peer-to-Peer Networking and Applications: 1\u201315.","DOI":"10.1007\/s12083-024-01622-0"},{"issue":"16","key":"442_CR35","doi-asserted-by":"publisher","first-page":"6004","DOI":"10.3390\/s22166004","volume":"22","author":"Y Zhu","year":"2022","unstructured":"Zhu Y, Li B, Yang Y et al (2022) Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature. Sensors 22(16):6004","journal-title":"Sensors"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00442-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00442-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00442-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T09:12:24Z","timestamp":1767517944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00442-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,4]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["442"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00442-w","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,4]]},"assertion":[{"value":"11 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"3"}}